SlideShare a Scribd company logo
1 of 7
Download to read offline
Technology for access control
to social institutions

Center of Innovative
Wireless Technologies
Abstract
The technology controls personnel, student and visitor
movement at educational and social institutions. It implies
sensor network deployment on the base of Bluetooth 4.0
BLE technology.
Special application installed on a visitor's smartphone registers
movement across the given territory and allows to get automated
access to specific services (access to enclosed space, literature
from the library, lunch, etc.).
Original network protocols involve bootstrapping modules considering
network topology, distance to the nearest node and device operating
mode.
Management system structure
and the principles of operation
The server processes
the requests received
from transmitters in the
access cell. Afterwards
the application calculates
the zone radii where
the identification objects
are located at a given
time, and recognizes
them according
to hardware addresses
(MAC-addresses).
Management system structure
and the principles of operation
SDS
Objects data
collection

Device data
transfer

Positioning server

Defining device
position

TCP-client

Web-application
client
Content request
from web-server
and regular
checks for
updates

Content
transfer

Update
request

Web-application
server
Content generation
on the base
of the positioning
server data

The addresses are
registered when
the mobile is firstly
occurred in the cell
and are stored
in a database
server for some
time.
Location determination algorithm
1. Each stationary Bluetooth device searches for Bluetoothactive mobile customers with a given frequency.
2.

As the client accesses the area of a base unit it connects
with the unit by Bluetooth and server receives the device
address and data.

3.

The server part of the program complex processes the data
received and checks the address according to a proper
permission.

4.

In case your mobile device has not passed the registration
procedure upon the entrance to the access zone,
MAC-address is filtered and device will not be permitted
to transfer control actions and to implement various
management scenarios.
Location determination algorithm
5.

After identification the program analyzes the data received
and compares it with the data of specific access areas
defined by the relevant range.

6.

Afterwards the application determines the approximate
location of a particular mobile device relative to
a stationary base unit.

7.

After the initial locating determination, during its movement
within the stationary base zone, the zone boundaries
are shifted by a predefined step depending on the way
the signal level changes.
Contacts
Centre for Innovative Wireless Technologies
Ulyanovsk, Russia

Center of Innovative
Wireless Technologies

Vitaly Dementiev, chief executive
+7-951-098-65-14
E-mail: dve@ulntc.ru

Ulyanovsk Centre for Technologies
Transfer
Phone, fax: (8422) 77-81-92
E-mail: ctt@ulstu.ru, http://ctt.ulstu.ru
32, Severny Venets st., Ulyanovsk, Russia,
432027.

More Related Content

Similar to CIWT_CeBIT

Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttRahul kulshrestha
 
The proposed System for Indoor Location Tracking
The proposed System for Indoor Location TrackingThe proposed System for Indoor Location Tracking
The proposed System for Indoor Location TrackingEditor IJCATR
 
Cell Site Surveying V4
Cell Site Surveying V4Cell Site Surveying V4
Cell Site Surveying V4Firoze Hussain
 
Wi-Fi Offloading.PDF
Wi-Fi Offloading.PDFWi-Fi Offloading.PDF
Wi-Fi Offloading.PDFAhmed Adel
 
Cell Site Surveying Case Study V1
Cell Site Surveying Case Study V1Cell Site Surveying Case Study V1
Cell Site Surveying Case Study V1Firoze Hussain
 
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based LocalizationPedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localizationijwmn
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
 
Hybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesHybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesNavid Solhjoo
 
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...CSCJournals
 
Gsm Counter Surveillance V1
Gsm Counter Surveillance V1Gsm Counter Surveillance V1
Gsm Counter Surveillance V1Firoze Hussain
 
20121129 lte basic procedures (2)
20121129 lte basic procedures (2)20121129 lte basic procedures (2)
20121129 lte basic procedures (2)Debasish Sahoo
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scoreswebcric .site
 
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingKeynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingSayed Chhattan Shah
 
Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architecturesparipec
 
Mobile Provisioning Enterprise Network PON-Revisi-Final - English
Mobile Provisioning Enterprise Network PON-Revisi-Final - EnglishMobile Provisioning Enterprise Network PON-Revisi-Final - English
Mobile Provisioning Enterprise Network PON-Revisi-Final - EnglishMuharam Cahyadi
 

Similar to CIWT_CeBIT (20)

Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
Pppppppppttttttttttttttttttttt
 
The proposed System for Indoor Location Tracking
The proposed System for Indoor Location TrackingThe proposed System for Indoor Location Tracking
The proposed System for Indoor Location Tracking
 
Cell Site Surveying V4
Cell Site Surveying V4Cell Site Surveying V4
Cell Site Surveying V4
 
Wi-Fi Offloading.PDF
Wi-Fi Offloading.PDFWi-Fi Offloading.PDF
Wi-Fi Offloading.PDF
 
Cell Site Surveying Case Study V1
Cell Site Surveying Case Study V1Cell Site Surveying Case Study V1
Cell Site Surveying Case Study V1
 
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based LocalizationPedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localization
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphones
 
40120130405021
4012013040502140120130405021
40120130405021
 
Hybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesHybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_Services
 
Resume
ResumeResume
Resume
 
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
 
Gsm Counter Surveillance V1
Gsm Counter Surveillance V1Gsm Counter Surveillance V1
Gsm Counter Surveillance V1
 
Mobile meetup
Mobile meetupMobile meetup
Mobile meetup
 
20121129 lte basic procedures (2)
20121129 lte basic procedures (2)20121129 lte basic procedures (2)
20121129 lte basic procedures (2)
 
Indoor navigation system
Indoor navigation systemIndoor navigation system
Indoor navigation system
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scores
 
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingKeynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
 
Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architectures
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
 
Mobile Provisioning Enterprise Network PON-Revisi-Final - English
Mobile Provisioning Enterprise Network PON-Revisi-Final - EnglishMobile Provisioning Enterprise Network PON-Revisi-Final - English
Mobile Provisioning Enterprise Network PON-Revisi-Final - English
 

Recently uploaded

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

CIWT_CeBIT

  • 1. Technology for access control to social institutions Center of Innovative Wireless Technologies
  • 2. Abstract The technology controls personnel, student and visitor movement at educational and social institutions. It implies sensor network deployment on the base of Bluetooth 4.0 BLE technology. Special application installed on a visitor's smartphone registers movement across the given territory and allows to get automated access to specific services (access to enclosed space, literature from the library, lunch, etc.). Original network protocols involve bootstrapping modules considering network topology, distance to the nearest node and device operating mode.
  • 3. Management system structure and the principles of operation The server processes the requests received from transmitters in the access cell. Afterwards the application calculates the zone radii where the identification objects are located at a given time, and recognizes them according to hardware addresses (MAC-addresses).
  • 4. Management system structure and the principles of operation SDS Objects data collection Device data transfer Positioning server Defining device position TCP-client Web-application client Content request from web-server and regular checks for updates Content transfer Update request Web-application server Content generation on the base of the positioning server data The addresses are registered when the mobile is firstly occurred in the cell and are stored in a database server for some time.
  • 5. Location determination algorithm 1. Each stationary Bluetooth device searches for Bluetoothactive mobile customers with a given frequency. 2. As the client accesses the area of a base unit it connects with the unit by Bluetooth and server receives the device address and data. 3. The server part of the program complex processes the data received and checks the address according to a proper permission. 4. In case your mobile device has not passed the registration procedure upon the entrance to the access zone, MAC-address is filtered and device will not be permitted to transfer control actions and to implement various management scenarios.
  • 6. Location determination algorithm 5. After identification the program analyzes the data received and compares it with the data of specific access areas defined by the relevant range. 6. Afterwards the application determines the approximate location of a particular mobile device relative to a stationary base unit. 7. After the initial locating determination, during its movement within the stationary base zone, the zone boundaries are shifted by a predefined step depending on the way the signal level changes.
  • 7. Contacts Centre for Innovative Wireless Technologies Ulyanovsk, Russia Center of Innovative Wireless Technologies Vitaly Dementiev, chief executive +7-951-098-65-14 E-mail: dve@ulntc.ru Ulyanovsk Centre for Technologies Transfer Phone, fax: (8422) 77-81-92 E-mail: ctt@ulstu.ru, http://ctt.ulstu.ru 32, Severny Venets st., Ulyanovsk, Russia, 432027.